General

  • Target

    3630a1e6fc19ea50352af459a0ff1b0242a45880332ecb7038384b2dece6287c

  • Size

    1.2MB

  • Sample

    220626-dv47yafahl

  • MD5

    c7aca1e72a430ff030a5fce29265bd9d

  • SHA1

    4dbff028dee0f2c081e0b29d22f55188cdadb114

  • SHA256

    3630a1e6fc19ea50352af459a0ff1b0242a45880332ecb7038384b2dece6287c

  • SHA512

    50bf9637c3db7dff8d83c2b7316a23b02c596fa085d0b6a352f74a5a6e642b091401d115a6fc537a35116946918e26741b1b489c22b11b7f739e68e95ff05bc7

Malware Config

Extracted

Family

netwire

C2

gracenfavors.ddns.net:10134

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    HostId-%Rand%

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    btSkoUfJ

  • offline_keylogger

    true

  • password

    Password

  • registry_autorun

    false

  • use_mutex

    true

Targets

    • Target

      3630a1e6fc19ea50352af459a0ff1b0242a45880332ecb7038384b2dece6287c

    • Size

      1.2MB

    • MD5

      c7aca1e72a430ff030a5fce29265bd9d

    • SHA1

      4dbff028dee0f2c081e0b29d22f55188cdadb114

    • SHA256

      3630a1e6fc19ea50352af459a0ff1b0242a45880332ecb7038384b2dece6287c

    • SHA512

      50bf9637c3db7dff8d83c2b7316a23b02c596fa085d0b6a352f74a5a6e642b091401d115a6fc537a35116946918e26741b1b489c22b11b7f739e68e95ff05bc7

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks